Download file suffix BTC
mining steps:
(1) Download bitcoin official client, click here to download bitcoin official client
(2) after installing the client, start the client, and the client will start to synchronize network data within 3 minutes after startup. Because bitcoin data is huge, it may take several hours (depending on network speed and computer performance). The picture shows the client synchronizing network data:
please make sure that your C disk has more than 10GB of free space. If the C disk is not enough, you need to set the data to D disk or e disk. Check the method of putting bitcoin packets to D disk
(3) if your client displays English and you are not good at English, You can set it to Chinese. Click here to see how to set the bitcoin client to Chinese.
(4) the client's synchronization of network data will not affect our mining. First, we get our account address and click the "collection address" button of the client. At this time, you will see a very long list of addresses, similar to your bitcoin account, The bitcoin account address is automatically generated and unique in the world
(5) your account is now 0.00 BTC, which means you don't have bitcoin yet, but you can start mining now. Download an easy-to-use mining software cgminer. Click here to download the bitcoin mining software cgminer (cgminer can dig bitcoin and most of the coins, But not all currency mining can use cgminer)
(6) you need to confirm your graphics card model, if it is NVIDIA graphics card, then you can directly mine, please skip this step. If it is an ATI graphics card, you need to install an AMD SDK package in addition to cgminer. Click here to download the AMD SDK installation package
(7) cgminer is an English interface, but it does not affect a rookie to use it. Please unzip the downloaded cgminer to anywhere on your computer, and then enter the cgminer folder
(8) in the cgminer folder, create a new text file (txt) and write the content code as:
cgminer - O http://pool.btc38.com : 9332 - U XXXXXX - P btc38
change the above XXXXXX to the account address of your BTC wallet (get your address according to section 4 of this tutorial), After filling in, it is shown in the figure:
Xiaobian has configured the mine pool and port for you in the above code (the mine pool is a completely free mine pool provided by bitage). If you want to use other mine pools and ports in the future, please modify the mine pool URL and port by yourself
(9) change the. TXT suffix of the newly created TXT text file to. Bat suffix (if you compare dishes, the suffix will not be displayed at the back of the text file and the file name suffix will not be changed, please click here). After modification, the file is as shown in the figure:
(10) then double-click the run.bat file above to start mining. For example, if you get 0.001 bitcoin, it will be stored in the BTC address you fill in. (because BTC mining is very difficult at this stage, you may have to wait for a whole day to get BTC revenue. When mining, there may be some cards on the computer screen, because most of the resources of the graphics card are occupied.). (11) you may also want to know how to understand the mining interface. The figure below mainly indicates your speed and status:
note: in fact, the number of users of bitcoin mining is very large, and the output of bitcoin every 10 minutes is very limited, so mining is very difficult, If you have a powerful graphics card, there will be certain benefits. If your graphics card is not good, it may take you n hours to get a little bit of bitcoin. This tutorial is written by Xiaotian, editor of bitage (btc38. Com). The purpose is to let you get started and experience bitcoin. If you want to get better benefits through mining, You need to learn more about bitcoin pools and bitcoin mining strategies
4. Bitcoin mining pool
as mentioned above, the number of users of bitcoin mining is very large, and the output of bitcoin every 10 minutes is very limited, resulting in the situation that tens of millions of people scramble for a block. Therefore, if you use personal computers to mine alone, you may not be able to grab a block in a whole year, People have come up with a team mining method. The so-called team mining is the mining pool that we are going to talk about now
the mine pool is a server designed through a specific algorithm. All users connected to the mine pool server will form a team to mine. Although the performance of personal computers is small, the overall performance of thousands of people will become very powerful. In this case, the success rate of mining will be greatly improved, Once the team in the mine successfully creates a block, then all the team members will pay dividends according to the performance of each person's computer. For example, 1000 people are mining in the same mine pool. After digging out a block, the reward of n bitcoins generated by the block will be distributed according to the computer performance of the 1000 people. If your computer performance is strong, it may get 1 in 100; if the performance is backward, it may get 1 in 10000
in this case, the developer of the mine pool will generally charge 1% ~ 3% of the fee for each user as a handling fee, but because this method makes it more stable for everyone to get bitcoin, almost everyone will choose to mine in the mine pool instead of mining alone
as mentioned in the mining tutorial above, the mine pool provided free of charge in the bit age adopts the P2P technology architecture and does not charge any fees to users. It is one of the mainstream mine pools. In addition, there are BTC guild and deepbit, which are also very popular. Although the design of each mine pool is not the same, but the use method is basically the same and simple, so this tutorial will not do further description, you can explore by yourself. Even though Xiaobian has configured the mine pool and port provided by bit era for you by default in the previous tutorial, in order to let you have a deeper understanding of the mine pool, here are several mainstream mine pools for you to choose:
bit mine pool (free, recommended by Xiaobian) | bitcoin.cz (suitable for novices) | BTC Guide (the oldest brand) | deepbit (stable and efficient) | f2pool (domestic)
there are some points for attention in account setting. It is suggested to set a common account in e-mail
then there is the most important miner account setting. Miner obviously refers to CPU or GPU. You need to set an account for each CPU or GPU. Suppose you have two hd7990, you need to set four different accounts for four GPUs
after the account registration, it's time to take the second step. Download the bitcoin miner. Here we recommend the small and easy-to-use guiminer, which can support CPU, oepncl, CUDA and other computing modes. Your CPU and graphics card can achieve maximum performance
guiminer, a bitcoin miner, still needs to make certain settings. After the interface is changed to Chinese, it will be very simple
if the setting is correct, click the "start mining" button, the graphics card will soon enter the full speed running state, the temperature and fan speed will increase, and you can also monitor the state through gpu-z or graphics card driver
the computing power displayed by guiminer is only a theoretical value. To know the actual output of bitcoin, you need to log in to the mine pool website, btcguild, to monitor your account information
now let's assume that you have g up several bitcoins, which naturally exist in btcguild, a foreigner's website. They can't be traded or converted into paper money for the time being
the functions provided by bitcoin China trading platform are clear at a glance, and you can understand them as soon as you read them, so you don't need to introce them any more. After you register, you can study them slowly
click the "bitcoin recharge" function of bitcoin China trading platform, and the system will provide you with a one-time bitcoin digital wallet address. This address can only be recharged once (for security reasons of the platform). After successful recharge, it will be invalid, and then the system will provide you with another address. Remember to update the wallet address in time every time, Otherwise, it will lead to recharge failure or loss
OK, now we import bitcoin from foreign websites into bitcoin China website, and it's up to you to deal with it. Keep it for appreciation, listing and selling, and exchange it for RMB. Specific how to operate, this Chinese website is easy to operate, we slowly study it
finally, let's talk about the equipment used in the bitcoin mining test. At first, I thought it was just an ordinary hd7870, but its computing power was much better than that of the ordinary hd7870. The key is that guiminer recognized it as the Tahiti core, which is the only core of hd7900 series. Looking at gpu-z, the card originally had as many as 1536 stream processors, Generally, the hd7870 of Pitcairn core has only 1280 stream processors. No wonder Dylan's graphics card has super computing power
for friends who hang up for a long time, performance is not the most important, and stability is the most important.
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
{rrrrrrr}
10
(3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning
last year, bitcoin was quite crazy, with the highest price rising to 120000. Many companies began to launch their own mines or coins at this time of storm, and then publicized that they are regional chain technology, when they get to * * to recycle, how much to guarantee the revenue, and so on. Then it starts to issue, so that people can start to buy money, and then it is stipulated that the transaction can be carried out after * * months or * * coins. This is the beginning of "cutting leeks" by backstage people. It's up to you to decide whether this coin is worth that money or not
other currencies, such as bitcoin and Ethernet, can be traded at any time (if someone buys them), even 0.001 can be traded.
At the beginning, I heard that it was so serious all of a sudden. As a practitioner, I really had a sense of fear. Once it spread in my scope, it would cause endless trouble to my work. Moreover, some phenomena were exaggerated in the report, such as unnecessary operation and automatic infection of virus. I don't know how this principle came about. Is it a myth of network technology, Viruses, Trojans and malware become uncontrollable demons
"eternal blue virus" can scan windows machines with open 445 file sharing port to implant malicious programs. There are no absolutely safe operating systems in the world. They are all early systems of foreigners. Besides, there are no flawless things in the world. I have to learn more and take good precautions. I am engaged in enterprise information and security work. I know the dangers of viruses, Trojans and malicious programs, and I can't help the panda who gets up early to burn incense. There are a lot of solutions, but some people are still poisoned
how to shut down ports 445, 135, 137, 138 and 139 and turn off network sharing can also avoid winning. The method is as follows:
run, input "dcomcnfg", right-click "my computer" on the right of "computer" option, and select "properties". In the default properties tab of my computer properties dialog box, remove the check before "enable Distributed COM on this computer", select the default protocol tab, select "connection oriented TCP / IP", click "delete" button,
Close ports 135, 137 and 138: right click the network neighbor to select properties, On the new connection, right-click to select properties, and then select the network tab to remove the check boxes of Microsoft network file and printer sharing and Microsoft network client. In this way, ports 135, 137 and 138 on the shared end are closed
Close port 139: Port 139 is a NetBIOS session port for file and print sharing. The way to close 139 is to select "Internet Protocol (TCP / IP)" attribute in "local connection" in "network and dial-up connection", enter "advanced TCP / IP settings" and "disable TCP / IP NetBIOS" in "wins settings", and check to close 139 port
Close port 445: start - run, input regedit. After confirming, locate to HKEY_ LOCAL_ Machine, system, currentcontrolset, services, NetBt, parameters, create a new DWORD value named smbdeviceenabled, and set it to 0 to close port 445
whether practitioners or ordinary users, it is a difficult problem to face the virus Trojan horse vulnerability and malicious code. How to ensure their own safety is to take action in advance, take precautions, keep the safety warning in mind, and do not surf the Internet, operate or click randomly. There are so many bad guys that it is impossible to prevent them. Then the whole society should take action to make the virus and bad guys have no place to hide
1. Don't open strangers or unknown e-mails to prevent attacks through e-mail attachments
2. Try not to click the office macro running prompt to avoid virus infection from office components
3. Download the required software from the official website, do not double-click to open. JS,. VBS and other suffix files
4. Upgrade NGAF to the latest anti-virus and other security features library
5. Upgrade the anti-virus software to the latest anti-virus library to prevent the attack of existing virus samples
6. Regularly back up important data and files in different places, and recover them in case of virus< According to the characteristics of the blackmail virus, we can judge that its variants can usually hide features, but can not hide its key behavior. After summarizing, the behavior of the blackmail virus in the process of running mainly includes the following aspects:
1. HTTP request through script file; 2
2. Download files through script files
3. Read remote server files
4. Collect computer information
5. Traverse the file
6. Call the encryption algorithm library.
bitcoin can be cashed and converted into the currency of most countries. Users can use bitcoin to buy some virtual items, such as clothes, hats and equipment in online games. As long as someone accepts it, they can also use bitcoin to buy real-life items.
